| /src/external/bsd/ipf/dist/tools/ |
| ippool.c | 81 fprintf(stderr, "\t-a [-dnv] [-m <name>] [-o <role>] [-t type] [-T ttl] -i <ipaddr>[/netmask]\n"); 82 fprintf(stderr, "\t-A [-dnv] [-m <name>] [-o <role>] [-S <seed>] [-t <type>]\n"); 84 fprintf(stderr, "\t-F [-dv] [-o <role>] [-t <type>]\n"); 86 fprintf(stderr, "\t-r [-dnv] [-m <name>] [-o <role>] [-t type] -i <ipaddr>[/netmask]\n"); 87 fprintf(stderr, "\t-R [-dnv] [-m <name>] [-o <role>] [-t <type>]\n"); 152 int err = 0, c, ipset, role, type = IPLT_POOL, ttl = 0; local 159 role = IPL_LOGIPF; 171 if (setnodeaddr(type, role, ptr, optarg) == 0) 183 "cannot set role after ip address\n"); 186 role = getrole(optarg) 267 int type, role, c, err; local 412 int c, type, role; local 527 int c, role, type, arg; local 593 int role; local 651 int c, role, type, live_kernel; local [all...] |
| ippool_y.y | 89 %type <num> role table inout unit dstopts weighting 106 line: table role ipftree eol { ip_pool_node_t *n; 117 | table role ipfhash eol { iphtent_t *h; 128 | groupmap role number ipfgroup eol 184 role: IPT_ROLE '=' unit { $$ = $3; } label 588 { "role", IPT_ROLE },
|
| /src/external/bsd/wpa/dist/wpa_supplicant/wpa_gui-qt4/ |
| eventhistory.h | 26 QVariant data(const QModelIndex &index, int role) const; 28 int role = Qt::DisplayRole) const;
|
| eventhistory.cpp | 27 QVariant EventListModel::data(const QModelIndex &index, int role) const 32 if (role == Qt::DisplayRole) 48 int role) const 50 if (role != Qt::DisplayRole)
|
| /src/external/bsd/ntp/dist/sntp/unity/auto/ |
| colour_prompt.rb | 92 def colour_puts(role,str) ColourCommandLine.new.out_c(:puts, role, str) end 93 def colour_print(role,str) ColourCommandLine.new.out_c(:print, role, str) end
|
| /src/external/bsd/ipf/dist/lib/ |
| load_dstlistnode.c | 19 load_dstlistnode(role, name, node, iocfunc) 20 int role; 37 op.iplo_unit = role;
|
| load_poolnode.c | 19 load_poolnode(role, name, node, ttl, iocfunc) 20 int role; 34 op.iplo_unit = role;
|
| /src/external/bsd/openldap/dist/contrib/slapd-modules/rbac/ |
| rbacreq.c | 54 /* add/drop role */ 55 BER_BVZERO( &reqp->role );
|
| rbacsess.c | 236 // convert the role name to lower case: 237 rbac_to_lower( &reqp->role ); 240 ber_dupbv( &vals[0], &reqp->role ); 271 "role already activated in session\n" ); 306 // convert the role name to lower case: 307 rbac_to_lower( &reqp->role ); 309 ber_dupbv( &m->sml_values[0], &reqp->role ); 314 ber_dupbv( &m->sml_nvalues[0], &reqp->role ); 318 //ber_dupbv( &m->sml_nvalues[0], &reqp->role); 968 /* no role requested, assign all roles from the user to the session. * 974 struct berval role; local 993 struct berval role; local [all...] |
| util.c | 92 /* assume well-formed role/user-constraints, for the moment */ 96 "rbac role/user constraint not well-formed: %s\n", 509 rbac_role2constraint( struct berval *role, rbac_constraint_t *role_constraints ) 513 if ( !role_constraints || !role ) goto done; 517 if ( ber_bvstrcasecmp( role, &cp->name ) == 0 ) { 518 /* found the role constraint */
|
| rbac.h | 82 /* user role assignments, role constraints, and user constraint */ 117 struct berval role; member in struct:rbac_request 126 struct berval name; /* user name or role name */ 374 struct berval *role,
|
| /src/sys/dev/ic/ |
| isp_ioctl.h | 59 * role that was passed in (the old role will be returned). It almost 72 * Get the current adapter role 120 role : 2, member in struct:isp_fc_device
|
| aic7xxx.c | 163 role_t role); 710 if (devinfo.role == ROLE_INITIATOR) { 1637 u_int *period, u_int *ppr_options, role_t role) 1666 if (role == ROLE_TARGET) 1790 u_int *offset, int wide, role_t role) 1807 if (role == ROLE_TARGET) 1820 u_int *bus_width, role_t role) 1835 if (role == ROLE_TARGET) 2168 role_t role; local 2172 role = ROLE_TARGET 2240 role_t role; local [all...] |
| aic79xx.c | 137 role_t role); 207 role_t role, uint32_t status, 1207 if (devinfo.role == ROLE_INITIATOR) { 2766 u_int *period, u_int *ppr_options, role_t role) 2789 if (role == ROLE_TARGET) 2855 role_t role) 2871 if (role == ROLE_TARGET) 2884 u_int *bus_width, role_t role) 2899 if (role == ROLE_TARGET) 3355 role_t role; local 3429 role_t role; local [all...] |
| isp_netbsd.c | 229 *(int *)addr = FCPARAM(isp, bus)->role; 231 *(int *)addr = SDPARAM(isp, bus)->role; 249 *(int *)addr = FCPARAM(isp, bus)->role; 250 FCPARAM(isp, bus)->role = nr; 252 *(int *)addr = SDPARAM(isp, bus)->role; 253 SDPARAM(isp, bus)->role = nr; 312 ifc->role = lp->roles; 1181 "PortID %#06x handle %#x role %s %s\n" 1184 "PortID %#06x handle %#x role %s %s tgt %u\n" 1279 if ((FCPARAM(isp, bus)->role & ISP_ROLE_INITIATOR) & [all...] |
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| p2p_supplicant_sd.c | 482 u8 role; local 496 "Role"); 504 role = *pos++; 505 wpa_printf(MSG_DEBUG, "P2P: WSD for device role 0x%x", role); 507 /* TODO: role specific handling */ 1033 static void wfd_add_sd_req_role(struct wpabuf *tlvs, u8 id, u8 role, 1045 wpabuf_put_u8(tlvs, role); 1067 const u8 *dst, const char *role) 1074 subelems = os_strchr(role, ' '); [all...] |
| /src/external/bsd/wpa/dist/wpa_supplicant/dbus/ |
| dbus_new_handlers_wps.c | 25 int role; /* 0 - not set, 1 - enrollee, 2 - registrar */ member in struct:wps_start_params 45 "dbus: WPS.Start - Wrong Role type, string required"); 47 "Role must be a string"); 52 params->role = 1; 54 params->role = 2; 56 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown role %s", val); 186 if (os_strcmp(key, "Role") == 0) 217 * information about role (enrollee or registrar), authorization method 254 "dbus: WPS.Start - Pin required for registrar role"); 256 message, "Pin required for registrar role.") [all...] |
| dbus_new.h | 208 const char *role); 440 const char *role)
|
| /src/external/bsd/nsd/dist/ |
| util.h | 50 * Set the name of the role for the process (for debugging purposes) 52 void log_set_process_role(const char* role); 54 #define log_set_process_role(role) /* empty */
|
| configparser.y | 36 static int parse_catalog_role(const char *str, int *role); 57 int role; 68 %type <role> catalog_role 1468 parse_catalog_role(const char *str, int *role) 1471 *role = CATALOG_ROLE_CONSUMER; 1473 *role = CATALOG_ROLE_PRODUCER;
|
| /src/external/bsd/wpa/dist/src/common/ |
| dpp_auth.c | 846 "DPP: Local policy does not allow Configurator role"); 855 "DPP: Local policy does not allow Enrollee role"); 870 "DPP: Local policy does not allow Configurator/Enrollee role"); 875 wpa_printf(MSG_DEBUG, "DPP: Unexpected role in I-capabilities"); 877 DPP_EVENT_FAIL "Invalid role in I-capabilities 0x%02x", 1382 u8 role = auth->r_capab & DPP_CAPAB_ROLE_MASK; local 1384 if ((auth->configurator && role != DPP_CAPAB_ENROLLEE) || 1385 (!auth->configurator && role != DPP_CAPAB_CONFIGURATOR)) { 1387 DPP_EVENT_FAIL "Unexpected role in R-capabilities 0x%02x", 1388 role); 1418 u8 role; local [all...] |
| /src/sys/dev/i2c/ |
| fusbtc.c | 272 if (of_hasprop(child, "power-role")) { 273 const char *role = fdtbus_get_string(child, "power-role"); local 275 if (!strcmp(role, "dual")) 277 if (!strcmp(role, "sink")) 279 if (!strcmp(role, "source"))
|
| /src/sys/arch/arm/xilinx/ |
| zynq_usb.c | 67 enum zynq_usb_if type, enum zynq_usb_role role) 78 sc->sc_role = role;
|
| /src/external/bsd/wpa/dist/src/p2p/ |
| p2p_invitation.c | 663 int p2p_invite(struct p2p_data *p2p, const u8 *peer, enum p2p_invite_role role, 670 p2p_dbg(p2p, "Request to invite peer " MACSTR " role=%d persistent=%d " 672 MAC2STR(peer), role, persistent_group, force_freq, 690 p2p->retry_invite_req = role == P2P_INVITE_ROLE_GO && 703 role != P2P_INVITE_ROLE_CLIENT) < 0) 706 if (persistent_group && role == P2P_INVITE_ROLE_CLIENT && !force_freq && 727 p2p->inv_role = role;
|
| /src/sys/netbt/ |
| hci_le.h | 360 uint8_t role; member in struct:__anon7401
|